ITNE2002 Assignment 2: Smartphone Security Analysis

Verified

Added on  2023/04/24

|10
|706
|305
Report
AI Summary
This report, prepared for ITNE2002 Network and Information Security, examines the critical aspects of smartphone security. It begins by highlighting the increasing importance of mobile security in modern computing. The report identifies several key security threats, including botnets, malicious attacks, spyware, data breaches, and DOS attacks, providing detailed explanations of each. It then explores various mitigation tools and techniques to enhance smartphone security, such as strong passwords, biometric recognition, SIM card locks, protection of sensitive data, blocking spam and fraud, antivirus software, and the use of authentic applications. The report concludes by emphasizing the importance of user awareness and the adoption of robust security practices to protect personal information and ensure safe smartphone usage. The references cited provide further context to the analysis.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Smart phones
security
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Introduction
Mobile security has become increasingly important in the field
of mobile computing
In this modern era, the security of mobile phones is one of the
biggest issue faced by users.
The aim of this presentation is to analysis the security-related
issues of smartphones and mitigation tools to reduce such a
problem.
Document Page
Smart phones security issues
There are numerous kinds of security threats and issues occur
in the smart phones which are following:
Botnet
Malicious attack
Spyware
Data breach
DOS attack (Allam, Flowerday, and Flowerday, 2014).
Document Page
Smart phones security issues
Botnet:
It is a hacking technology which is used by the attackers to
identify the personal details of the users mobile phones
In which hackers mainly detect the passwords of the user’s
mobile phones
Malicious attack:
Malicious is defined as the software which is used by the criminal
to produce a large number of viruses and traffic signals
Hackers transfer the spam and viruses on users mobile device to
reduce the performance of their servers and enter into their
smartphones
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Smartphones security issues
Spyware:
Such kind of technique is used by the attackers to hijack the
smartphones of the consumers.
It has the potential to control and detect the text messages and
calls of the users (Zonouz, et al., 2013).
It also allows hackers to track the personal data of consumers and
their location Data Breach:
It is very common security threat occur in the smart phones
When users use the unwanted links and third party applications
they can suffer from the data breach related issues.
Document Page
Smart phones security issues
DOS attack:
It is defined as the denial of service attack which is occurred due
to the use of spam and unauthentic servers.
In which attackers first generate a huge amount of traffic signals
and transfer to the user's networks.
Hackers enter into the user's smartphones with the help of
internet connectivity's and block their personal information.
Document Page
Methods to improve smartphones security
There are various technologies and tools which can be used to
improve security of the smartphones which are following:
Use strong password rather than simple
Adopt the biometric recognition tools like fingerprint and eye
recognition
Use a SIM card lock
Protect sensitive data from hackers
Block spam and fraud mails
Protect internet connectivity by using antivirus
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Methods to improve smartphones security
Download and use only configured and authentic applications
(Ho, et al., 2015).
Turn off location if they users are not using
Use backup plans to secure the more important data from
hackers
Use application lock tools to protect data from criminal
Document Page
Conclusion
This presentation is completely based on the smartphones
security and readers can enhance their skills in the field of
mobile security
This presentation described the different types of security
threats and issues occur in the mobile phones and mitigation
tools
Users should ensure that they use only authentic networks
and block fraud mails from smartphone
Document Page
References
Allam, S., Flowerday, S.V. and Flowerday, E., (2014)
Smartphone information security awareness: A victim of
operational pressures. Computers & Security, 42(2), pp.56-65.
Zonouz, S., Houmansadr, A., Berthier, R., Borisov, N. and
Sanders, W., (2013) Secloud: A cloud-based comprehensive
and lightweight security solution for smartphones. Computers
& Security, 37(4), pp.215-227.
Ho, F., Wang, C.N., Ho, C.T., Chiang, Y.C. and Huang, Y.F., (2015)
Evaluation of Smartphone feature preference by a modified
AHP approach. In Industrial Engineering and Engineering
Management (IEEM), 2015 IEEE International Conference on,
6(2), pp. 591-594.
chevron_up_icon
1 out of 10
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]